Hey everyone! I'm not a Sysadmin, but I've set up a server at home and want to expose some services while keeping my other devices secure. I've done some research and think a DMZ approach is what I need. My question is: can VLANs be used to separate a network and create a pseudo DMZ without the need for two separate firewalls? I have a server running Proxmox with virtual machines for internal services and one for internet-facing services. I'd appreciate any insights you can share!
5 Answers
While you can segment using VLANs for a DMZ, just be cautious. It’s not inherently safer; you need to ensure that your network can properly defend against attacks. Isolation is key, but so are your firewall rules.
Absolutely, you can use VLANs for a DMZ setup! It's common practice to use a separate VLAN for DMZ services, with strict firewall rules to control traffic. For example, you'd want your internet to access the DMZ, but not the other way around. This way, if your VM is compromised, the attacker won’t easily access your internal network. You don’t need two firewalls for this; one capable firewall can manage the VLANs effectively. Just remember to treat your DMZ as untrusted and open only the necessary ports!
And make sure your firewall supports default deny! Some devices, like certain Meraki models, can create security gaps.
Two firewalls aren't automatically better than one, especially if you can set up VLANs well. Just be sure to have solid rules in place to filter the traffic. In my home setup, I use a Ubiquiti device and it works great! Just keep things isolated, and you should be all set.
Same here! Restricting that DMZ access is key.
And if you're exposing services, consider using Cloudflare tunnels for added security!
Yes, VLANs can definitely help in creating a DMZ. It's usually about setting up a VLAN for your DMZ with firewall rules that strictly limit traffic between it and your internal network. Think of it as keeping your internet-facing services isolated. For added safety, keep your internal network from allowing broad access back from the DMZ. This segregation is a step up in safety for any home lab solution!
Exactly! Good rules go a long way. Plus, using something like Proxmox makes it easier to manage those virtual machines.
Just be sure to only permit the exact traffic you need to come from your DMZ back into internal systems!
You can definitely do this! Just remember that a VLAN is more about traffic separation at the link layer. The real magic happens with how you set up your firewall rules. Keep your DMZ as a 'less trusted' zone, and only open specific ports as needed between your services. It’s doable with a single firewall, but you need to be smart about configurations.

Totally agree! The key is in the filtering rules between VLANs, treat your DMZ like it could be dangerous.